Bloomberg Report: Zynga Rises in Debut After Raising $1B in IPO

Bloomberg Report: Zynga Rises in Debut After Raising $1B in IPO

Zynga Inc., the largest maker of games for Facebook, was little changed in its first day of trading after raising $1 billion in an initial public offering that gave it a higher valuation than Electronic Arts Inc. (ERTS)

The shares, listed on the Nasdaq Stock Market under the symbol ZNGA, gained 1 cent to $10.01 at 11:36 a.m. New York time. The developer of games such as “CityVille,” “FarmVille” and “Mafia Wars” sold 100 million shares for $10 each, the top end of an $8.50 to $10 range, Zynga said in a statement.

Zynga gets more than 90 percent of its revenue from Palo Alto, California-based Facebook Inc., and faces increasing competition from Electronic Arts, which bolstered its own online services by purchasing PopCap Games this year. Nexon Co., a Tokyo-based maker of games for Facebook including “Zombie Misfits,” slumped 15 percent this week after raising $1.2 billion in an IPO, Japan’s biggest this year.

“You’re definitely going to see more competition” for Zynga as other companies expand their user bases, said Richard Greenfield, an analyst at BTIG LLC in New York. “On the other hand, I think it’s also going to bring more people into the overall social gaming space.” Continue Reading…

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The 80-20 Rule For Security Practitioners Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…